Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

61 – 70 of 137 results


CVE-2007-4567

Medium priority
Fixed

The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer...

4 affected packages

linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-5966

Medium priority
Fixed

Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE:...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-6434

Medium priority
Not affected

Linux kernel 2.6.23 allows local users to create low pages in virtual userspace memory and bypass mmap_min_addr protection via a crafted executable file that calls the do_brk function.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-6417

Low priority
Fixed

The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-6151

Unknown priority
Fixed

The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-5938

Low priority
Not affected

The iwl_set_rate function in compatible/iwl3945-base.c in iwlwifi 1.1.21 and earlier dereferences an iwl_get_hw_mode return value without checking for NULL, which might allow remote attackers to cause a denial of service (kernel...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-6206

Low priority
Fixed

The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-5494

Negligible priority
Not affected

Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-6063

Low priority
Fixed

Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.

6 affected packages

linux, linux-source, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-5500

Medium priority
Fixed

The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages